Abstract
The past security policy about public key management strongly relied on the key matrix which was preset by the base station or generated by the algorithm embedded in the nodes, then to exchange the public key with others to finish the security communications, but a lot of public keys were stored in the nodes, which consumed much energy and might be captured and gained by the attacked nodes. In this chapter, we adopt the bilinear pairing theory to the public key generation and management which does not require the public key in the nodes and applies the node’s information to the public keys, which may reduce the cost of managing the public keys and enhances the security of key management; then we propose a cluster key distributed scheme on the basis of clustering by using the bilinear pairing key management in the wireless sensor network and demonstrate its feasibility and security theoretically.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akyildiz IF, Su W, et al. Wireless sensor networks: a survey. Comput Netw. 2002;38(4):393–433.
Pamo B, Perrig A, Gligor V. Distributed detection of node replication attacks in sensor networks. In: Proceedings of the IEEE symposium on security and privacy, vol. 8. IEEE Computer Society; 2005. pp. 49–63.
Perrig A, Szewczyk R, et al. SPINS: security protocols for sensor networks. Wirel Netw. 2002;8(5):521–34.
Chan H, Perrig A, Song D. Key distribution techniques for sensor networks. Wirel Netw. 2004;6(2):277–303.
Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of the CRYPTO 84 on Advances in Cryptology; Springer, New York; 1985. p. 47–53.
Boneh D, Franklin M. Identity-based encryption from the weil pairing. SIAM J Comput. 2003;32(3):586–615.
Liu DG, Ning P. Multi-level μTESLA: a broadcast authentication system for distributed sensor networks. ACM(TECS). 2004;3(4):800–36.
Sahai A, Waters B. Fuzzy identity-based encryption. In: Advances in Cryptology-EUROCRYPT of Lecture Notes in Computer Science, vol. 3494; Springer, Berlin; 2005. p. 457–73.
Zhang F, Safavi Naini R, Susilo W. An efficient signature scheme from bilinear pairings and its applications. In: Practice and Theory in Public Key Cryptography-PKC, LNCS, vol. 2947; 2004. p. 277–90.
Acknowledgements
This research was supported by No. 61103017 China National Foundations, No. CG1215 Lianyungang Science and Technology Project and No. SH1212 Lianyungang Social Development Project.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Liu, X., Zhao, Q. (2015). Cluster Key Scheme Based on Bilinear Pairing for Wireless Sensor Networks. In: Wong, W. (eds) Proceedings of the 4th International Conference on Computer Engineering and Networks. Lecture Notes in Electrical Engineering, vol 355. Springer, Cham. https://doi.org/10.1007/978-3-319-11104-9_35
Download citation
DOI: https://doi.org/10.1007/978-3-319-11104-9_35
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11103-2
Online ISBN: 978-3-319-11104-9
eBook Packages: EngineeringEngineering (R0)